AU - Pishdar, Mohammad AU - Seifi, Younes AU - bag-mohammadi, Mozafar TI - A survey on RPL attacks and their countermeasures PT - JOURNAL ARTICLE TA - isc-monadi JN - isc-monadi VO - 9 VI - 1 IP - 1 4099 - http://monadi.isc.org.ir/article-1-179-en.html 4100 - http://monadi.isc.org.ir/article-1-179-en.pdf SO - isc-monadi 1 ABĀ  - RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Example IoT applications are smart energy grid, smart home, connected car, intelligent transport systems, and smart cities. IoT is different from many similar technologies due to the existence of low power electronic circuits and limited connectivity. Information security is one of the main IoT concerns. The emergence of new types of security vulnerabilities in IoT devices and the escalation of their damages through numerous IoT applications is considered a major deployment drawback for RPL. In this paper, major cyberattacks against RPL, as well as related security solutions are addressed. Then, these solutions are classified and their weaknesses and strengths are investigated. Finally, it discusses the state-of-the-art status of information security in RPL. CP - IRAN IN - LG - eng PB - isc-monadi PG - 30 PT - Review Article YR - 2020